February 8
2013
This report about the five most significant security breaches of the past six months ago.
Nasser Algaber W20055883 Yosuf Altayar W20055881
Index
Subtitle pages
Introduction 3
Cyber Fraud 3-5
Data breaches 5-7
Network intrusion/ Hacking 7-10
Launching worms 10-11
Cyber bullying 11-12
Category of internet security Breaches 12
Reference 13
Introduction
The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.
Cyber Fraud
Cyber fraud can be defined as the use of software or internet services to defraud victims or taking advantage of them. This includes stealing information that is considered personal, in what constitutes identity theft. One of the most common forms of internet fraud entails distributing rogue security software. Internet technology has created the allowance for criminals to carry out fraudulent transactions, as well as transmit the proceeds of the frauds to other institutions. Cyber frauds occur in message boards, websites, emails and even chat rooms (Messner, 2012).
Purchase fraud is an example of cyber fraud and occurs when a perpetrator proposes a business transaction to a merchant, only to use fraudulent mechanisms,
References: In Defense of Data (2013) Data Breach trends and StatisticsRetrieved on February 6th, 2013, from http://www.cbc.ca/news/technology/story/2012/06/29/f-dns-ending.html Hazelden Foundation. (2012) Cyberbullying: A Prevention Curriculum for Grades 6-12 Scope and SequenceRetrieved on February 6th, 2012, from http://www.cyberbullyhelp.com/cyberBullying_ScopeSequence.pdf Messner, E. (2012). The Worst Data Breach Incidents of 2012: Out of 189 breaches recorded through mid-June, here are the top 15 according to Identity Theft Resource Center. Retrieved on February 6th, 2013, from http://www.csoonline.com/slideshow/detail/52656 Nnap (2011).Top 125 Network Security tools. Retrieved on February 6th, 2012, from http://Sectools.org/ Quinlan, M. (2012).Thousands May lose internet accessibility July 9 as a result of virus; The FBI to shut down temporary servers to block DNSChangervictims. Retrieved on February 6th, 2013, from http://www.cbc.ca/news/technology/story/2012/06/29/f-dns-ending.html Thiel, J. (2012). IDS/IPS: An Introduction to Intrusion Detection and Prevention Systems. Retrieved on February 6th, 2013, from http://www.ece.drexel.edu/telecomm/Talks/thiel.pdf